Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32953: CWE-303: Incorrect Implementation of Authentication Algorithm in tillitis tkeyclient

0
Medium
VulnerabilityCVE-2026-32953cvecve-2026-32953cwe-303
Published: Fri Mar 20 2026 (03/20/2026, 04:24:12 UTC)
Source: CVE Database V5
Vendor/Project: tillitis
Product: tkeyclient

Description

CVE-2026-32953 is a medium-severity vulnerability in the tillitis tkeyclient Go package versions 1. 2. 0 and below. The flaw causes 1 in 256 User Supplied Secrets (USS) to be ignored silently due to a buffer index error that overwrites a boolean flag with the first byte of the USS hash. If the USS hash starts with 0x00, the USS is discarded, resulting in the same Compound Device Identifier (CDI) and key material as if no USS was provided. This undermines the authentication mechanism and key uniqueness. The issue is fixed in version 1. 3. 0. Until upgrading, users can mitigate risk by selecting USS values whose hash does not begin with zero.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:40:15 UTC

Technical Analysis

The vulnerability CVE-2026-32953 affects the tillitis tkeyclient Go module, specifically versions 1.2.0 and earlier. The tkeyclient package is used for cryptographic key derivation involving User Supplied Secrets (USS) to generate a Compound Device Identifier (CDI). The flaw arises from a buffer index error that causes the USS-enabled boolean flag to be overwritten by the first byte of the USS digest. Since the USS digest is a hash, approximately 1 out of every 256 USS values will have a hash starting with 0x00. When this occurs, the boolean flag indicating USS usage is incorrectly set to false, causing the system to ignore the USS silently. Consequently, the CDI and derived key material are identical to those generated without any USS, effectively negating the security benefits of the USS. This undermines the authentication algorithm's integrity and could allow attackers to predict or reuse keys in scenarios relying on USS uniqueness. The vulnerability does not require authentication or user interaction to exploit but depends on the USS chosen. The issue has been addressed in version 1.3.0 of the tkeyclient package. Users unable to upgrade immediately are advised to avoid USS values whose hash begins with 0x00 to mitigate the risk. No public exploits or active attacks have been reported to date.

Potential Impact

This vulnerability impacts the confidentiality and integrity of cryptographic operations relying on the tillitis tkeyclient package. By silently ignoring certain USS values, the system may generate identical key material for different users or devices, potentially allowing unauthorized access or key reuse attacks. This could compromise secure communications, authentication, or data protection mechanisms that depend on unique USS-derived keys. The probability of exploitation is low (1 in 256 USS values), but the silent nature of the failure increases the risk of unnoticed security degradation. Organizations using affected versions in critical infrastructure, IoT devices, or secure authentication systems may face increased risk of key collisions or impersonation. However, the vulnerability does not affect availability and requires specific USS conditions, limiting widespread exploitation. The medium CVSS score (4.7) reflects moderate impact with relatively low exploit complexity but significant consequences for confidentiality and integrity if exploited.

Mitigation Recommendations

The primary mitigation is to upgrade the tillitis tkeyclient package to version 1.3.0 or later, where the buffer index error is fixed. For organizations unable to upgrade immediately, a practical workaround is to ensure that User Supplied Secrets (USS) do not produce a hash starting with 0x00. This can be implemented by pre-hashing candidate USS values and verifying the first byte before acceptance. Rejecting or regenerating USS values with a leading zero byte in their hash prevents the silent discard of USS and maintains key uniqueness. Additionally, organizations should audit existing USS usage to detect potential collisions or reused key material. Implementing monitoring to detect unexpected identical Compound Device Identifiers (CDIs) may help identify exploitation attempts. Finally, integrating secure coding practices and thorough testing for cryptographic modules can prevent similar buffer and flag overwrite errors in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.285Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcd2fce32a4fbe5f2df425

Added to database: 3/20/2026, 4:54:20 AM

Last enriched: 3/27/2026, 7:40:15 PM

Last updated: 5/2/2026, 3:08:09 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses